One of the most important problems is the secure communication of sensitive
data. Examples of these applications involve the acquisition of data,
and/or its transfer to another location , and/or orders of executation.
This device allows only the authorized receiver and sender to have
access to these types of operations. This information maybe transferred
only if the receiver and/or sender is physically at each machine
location or any combination thereof. Also while the data is in
transit there is an added feature; that is, if the data is intercepted by
"any"organization even with the greatest computer
capabilities, this data can not be decrypted by even the most sophicated
algorithms and super computers---even if the hardware were in the giga- petatops
operation ranges. No such computers exits today and it will be over thirty
years if any can possibly exist.

Our hardened system is composed of several elements all of which are
easily accessible in present day technology. It is the union and combination
of several devices that make our system novel, unique, practical,
and ultra hardened in a cost effective way. (It is also TEMPEST hardened
and for other exterior potential listening devices.) It is primarily
a hardware system that is composed of a portable PC with a special
purpose card, coupled to a unique hardware I/O device, and several fuzzy
software algorithms.

How does it work?

When the transmitter accesses the PC he or she is completely recognized by
the PC. The machine then sets up a partial key for an encryption system.
The transmitter then sends a message to the given receiver, again the
receiver's machine only allows an individual who the machine recognizes
to have access to this information. Once this occurs, the receiver's
machine returns two partial keys to the sender, one used for encryption
and the other used for decryption...then the message can be sent back and
forth in complete privacy. This is clipper technology plus!!!
Our system insures the complete privacy between the sender and
the receiver and is completely safe to all backdoors whether they be by a
fabricated software algorithm or any hardware means or any combination thereof.

Applications for our devices.

Banking transactions, strategic plans between executives and employees of
your company, mobil diplomatic communications, stock market trading,
personal data between individuals, hospitals medical data transfers, lawyers,
physicians, and any situation where complete privacy is
needed. Our devices can easily be placed in any given enterprise system.
It has intranet and internet capabilities and is compatible with any
LANS etc etc..features.

How hard are these devices?

These devices are Echelon Hardened. This device is also hardened
against the Russian's FAPSI, the PRC's Computer Surveillance Division, the
German's BND, Israel's Aman, Mossad and Shin Bet, Frances's SGDN, India's
CBI, anything that IBM, ATT (We are far superior than ATT's Fortezza card
which is not echelon hardened.), LMT and LOR may have. We are
putting world wide privacy back on the internet, faxes, etc. This device
is Carnivore hardened. (Due to the fact of the multiple of IS addresses and
the number of internet service providers. (Remember even if they
have the addresses, they can not break the coded message.) Our norm is Echelon
hardened which far surpasses Carnivore. Our philosophy is ....freedom
and privacy presupposes responsibility. When purchasing our device
certain agreements must be signed. (I am sure you understand.) Please remember
our purpose isn't to beat Echelon, but to have your privacy respected by
all.

Protect Your Secrets...From "ALL"...With This Device

Privacy is your right . Depending on the level of encryption in use
with these devices, and more important how these devices function, the problems
associated with computer security is "completely solved" for pennies on the
dollar.

Please read in the nutshell about these devices. The LODATO devices can be
customized to fit you specific needs. This device will generate strong
encrpyted discs, and help the absent minded professor on your staff or that
official who lost his or her PC.

This device can be altered such that "a square
mile of petatop computers" can work for over a year with no
success. Also software algorithms that use statistical analysis in an attempt
to try and understand word patterns etc...will find they are working with
an extremely and in some cases an ultra extreme uniform distribution.

How do we know this device does what it says it does?....Well, test
it and you'll see.

Why is this particular system of commercial value?

The answer is simple: for present conventional systems of this type, it cost
well over tens of thousands of dollars to manufacture and more to the buyer
based on indirect cost and profit to the manufacturer. Our system just cost
well under five thousand in direct cost to manufacture in mass production
and can be sold to small and medium size companies at an extremely
competitive price. These are custom transmitting and receiving devices. Again
with our device, communication between the receiver and sender even if over
the internet is completely secure from all intrusions and is highly mobile
in character making IP points of origins impossible to trace.

Not to long ago it was reported in the news that SCR-Thompson was bidding
on a contract in Brazil and an American company with the help of Echelon
intercepted some messages between SCR-Thompson and Brazil. It was reported
that the American company won the contract only because of the help from
Echelon. This is what the late Senate Frank Church , the past Chairman of
the USA Senate Intelligence Committee warned against. Our devices insure
fair free enterprise nationally and globally.

In a Nutshell what this device does: (1)
it physically recognizes both the sender and receiver
on a "real time basis " with over 50,000 pieces
of personal information about each individual, (2) checks on a real time
basis during the communication that the immediate area is secure, and (3)
the data is transmitted over the internet, intranet, any LAN, any WAN etc
with several possible levels of encryption. The highest beingEchelon hardened

There are two divisions of this device. It is the ultimate biometric
device. This stand alone section allows for person to person comunication
with or without encryption/decryption. This part of the device does not require
US government involvement.

Secondly it is an encryption /decryption device with the highest
level being echelon hardened.

The Echelon and/or NSA hardened system
is only available to members of Congress, the Supreme Court, and the Executive
Branch of the US government.

The knowledge of the encryption/decryption requires being in
conformity with US government regulations depending on the level requested
to be installed.

International Inquiries
Welcomed

Who Needs These Devices?

Are you preparing draft contracts for that $100,000,000 deal or MORE?

Investment bankers, Merchant bankers and all you folks in high finance.

Are you preparing a corporate take over and need to communicate with
key individuals?

Are you a diplomat and need to communicate in private?

Do you need to communicate with some one in your organization with complete
privacy?

Are you a lawyer and has to communicate with your client before trail?

Do you have a health problem and need to speak to a physician in private?

Do you need to transfer funds from one bank to another and need that privacy?

Are you a film producer and want to keep that next film script in private?

Are you a politician, like the late Senator Strom Thurmond, or don't want
NSA to listen to your ideas on your upcoming vote in the Congress?

If you want to communicate with key people in the utmost privacy, then you
need the LODATO device.

This Device is a must for all who handle ultra sensitive data. It's
cyber safety for your client, corporation and organization.

Due to the nature of the LODATO DEVICE....that is NO ONE (not even
NSA) can decode your message and we solved the back door (hardware
and/or software) problem .

If you are interested in purchasing our system please send us your organization's
name and address, contact person, a telephone number, a time to call the
contact person. Please send information to the following address..yes it's
a real cave.

This is a very novel and unique device that is chip and all software hardened.

The Cave .....77 McEntee St.....Kingston, NY 12401

Thank you for your interest in our hardware devices....or please email
(Vince Lodato, Ph.D.) at vlodato@aol.com or contact us in Kingston NY